Subscribe to RSS Feed (Opens in New Window)
2022 | ||
Wednesday, August 10th | ||
12:00 AM |
A Review of Cyberattack Research using Latent Dirichlet Allocation Ming Xiao, UNC Greensboro 12:00 AM |
|
---|---|---|
12:00 AM |
Burcu Bulgurcu, Toronto Metropolitan University 12:00 AM |
|
12:00 AM |
Agile Software Development Vulnerabilities and Challenges: An Empirical Study Wei Xie, Appalachian state university 12:00 AM |
|
12:00 AM |
May Bantan, Saudi Electronic University 12:00 AM |
|
12:00 AM |
Beyond Rational Information Security Decisions: An Alternate View Alaa Nehme, Mississippi State University 12:00 AM |
|
12:00 AM |
Care to Share Your Personal Information? Kevin Kim, University of Louisiana - Monroe 12:00 AM |
|
12:00 AM |
Cyber-risk assessment and mitigation of DDoS attacks using semi-structured data models Kalpit Sharma, Indian Institute of Management Amritsar 12:00 AM |
|
12:00 AM |
Madeeha B. Khan, University at Albany 12:00 AM |
|
12:00 AM |
Designing a Messaging Strategy to Improve Information Security Policy Compliance Federico Giovannetti, University of South Florida 12:00 AM |
|
12:00 AM |
JIANG HU, University of Texas at Arlington 12:00 AM |
|
12:00 AM |
Exploring the Characteristics and Needs of the Chief Privacy Officer in Organizations John G. Fehr III, Dakota State University 12:00 AM |
|
12:00 AM |
Jordan E. F. Bernot, UNT 12:00 AM |
|
12:00 AM |
Maliha Alam, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
How to Increase InfoSec Compliance by Matching the Messaging to the Right Users? Leigh A. Mutchler, James Madison University 12:00 AM |
|
12:00 AM |
Impact of User Experience and Comprehension on Awareness Training Jonathan Keirre Adams, Marymount University 12:00 AM |
|
12:00 AM |
INFORMATION SECURITY RISK AND BOUNDARY CHANGING BEHAVIOR Hilal Pataci, Rensselaer Polytechnic Institute 12:00 AM |
|
12:00 AM |
Sinjini Mitra, California State University, Fullerton 12:00 AM |
|
12:00 AM |
Privacy Boundaries: What is the Line? Matt Heinrich, Rockhurst University 12:00 AM |
|
12:00 AM |
Professional Environment Matters – National Characteristics of Information Security Overconfidence Lukas Manuel Ranft, Institute for Information Systems 12:00 AM |
|
12:00 AM |
Reconceptualizing Knowledge Based Authentication for Augmented and Virtual Reality Contexts christopher kreider, Christopher Newport University 12:00 AM |
|
12:00 AM |
Self-endorsed Cybersecurity Capability Improvement for SMEs Samuel A. Fricker, Fachhochschule Nordwestschweiz FHNW 12:00 AM |
|
12:00 AM |
The collective information privacy on social networking sites Sara Memarian Esfahani, University of North Texas 12:00 AM |
|
12:00 AM |
The Impact of Data Breach Announcements on Online Consumers Behavior Mohamed Hussein ELDOH, Grenoble Ecole de Management 12:00 AM |
|
12:00 AM |
M A Shariful Amin, University of North Texas 12:00 AM |
|
12:00 AM |
The Impact of Social Influence on Fake News Participation in Social Media Zahra Aivazpour, California Polytechnic State University 12:00 AM |
|
12:00 AM |
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection Debalina Bera, University of North Texas 12:00 AM |
|
12:00 AM |
Zhuoli Axelton, University of Wisconsin - Green Bay 12:00 AM |
|
12:00 AM |
Too Close to Home: The Drivers of Perceived Risk of Home Automation Sameh Al-Natour, Ryerson University 12:00 AM |
|
12:00 AM |
Burcu Bulgurcu, Toronto Metropolitan University 12:00 AM |